In today's world abundant data travelled from node to node or from cluster head to node or vice versa in a Wireless Sensor Network (WSN). This data can be of any type but it must consists the identity of that particular node where this data actually exist. The identity of that particular node is also as much important as the data. Due to this, there can be some security issues because if the identity of that particular node leaked out then any fake node can act as the original one and data will start transferring between that fake node and cluster heads (CH). Many attacks like Man-in-the-middle and DoS (Denial of Service) lead to the whole network in sink. Therefor there is the need to validate the node which is going to deal with any CH or any node that is it the original one or fake. This can be achieved with the help of some authentication protocols. We used FLAP (Frame Layer Protocol) as an authentication protocol to authenticate the nodes and CHs because its authentication speed is much faster than the other existing authentication protocols.
[1]
Sofiane Ouni,et al.
New Re-association Procedures for Reliable Handover in IEEE 802.15.4 Wireless Sensor Networks
,
2013,
ADHOCNETS.
[2]
Reliable message handover approach by re-association procedure in MWSN
,
2015,
2015 1st International Conference on Next Generation Computing Technologies (NGCT).
[3]
Periklis Chatzimisios,et al.
Packet delay analysis of IEEE 802.11 MAC protocol
,
2003
.
[4]
Mark Handley,et al.
The final nail in WEP's coffin
,
2006,
2006 IEEE Symposium on Security and Privacy (S&P'06).
[5]
Sami Uskela.
Security in Wireless Local Area Networks
,
1997
.
[6]
Jesse Walker,et al.
Unsafe at any key size; An analysis of the WEP encapsulation
,
2000
.
[7]
Dan Simon,et al.
PPP EAP TLS Authentication Protocol
,
1999,
RFC.
[8]
David A. Wagner,et al.
Intercepting mobile communications: the insecurity of 802.11
,
2001,
MobiCom '01.
[9]
Chao Yang,et al.
Security in Wireless Local Area Networks
,
2013
.